[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

US20090320103A1 - Extensible mechanism for securing objects using claims - Google Patents

Extensible mechanism for securing objects using claims Download PDF

Info

Publication number
US20090320103A1
US20090320103A1 US12/144,880 US14488008A US2009320103A1 US 20090320103 A1 US20090320103 A1 US 20090320103A1 US 14488008 A US14488008 A US 14488008A US 2009320103 A1 US2009320103 A1 US 2009320103A1
Authority
US
United States
Prior art keywords
security
provider
client
request
applicable scope
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US12/144,880
Other versions
US8990896B2 (en
Inventor
Venkatesh Veeraraghavan
Javier Dalzell
Benoit Schmitlin
Ambrose T. Treacy
Bryant Fong
Christian Roy
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Microsoft Technology Licensing LLC
Original Assignee
Microsoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Corp filed Critical Microsoft Corp
Priority to US12/144,880 priority Critical patent/US8990896B2/en
Assigned to MICROSOFT CORPORATION reassignment MICROSOFT CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: DALZELL, JAVIER, ROY, CHRISTIAN, TREACY, AMBROSE T., FONG, BRYANT, SCHMITLIN, BENOIT, VEERARAGHAVAN, VENKATESH
Publication of US20090320103A1 publication Critical patent/US20090320103A1/en
Assigned to MICROSOFT TECHNOLOGY LICENSING, LLC reassignment MICROSOFT TECHNOLOGY LICENSING, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MICROSOFT CORPORATION
Priority to US14/624,137 priority patent/US9769137B2/en
Application granted granted Critical
Publication of US8990896B2 publication Critical patent/US8990896B2/en
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • G06F21/335User authentication using certificates for accessing specific resources, e.g. using Kerberos tickets

Definitions

  • the security policies to be enforced be selectable by either type of object or for each object individually. Where necessary, different levels of security should be available, and easily configurable, to match a wide range of needs. Redundant information and duplicate effort should be minimized.
  • the methods used to control access should reflect the real world. Where the user is a member of a work group with similar needs, that group should be available to identify those users and their access rights. Where similar groups are applicable across a variety of objects, all of those objects should be able to reference the same logical group and see membership changes at substantially the same time. Further, access control should not be limited to a single concept such as groups. Existing, and new, concepts and rules used by one service or application should be available for use with other protected objects.
  • Still other aspects relate to providing augmented claims by polling the registered claims providers once an initial claim, or set of claims, is obtained in order to acquire additional claims which may be identified.
  • Additional aspects relate to filtering the set of claims which will be provided based upon one or more characteristics of the user, the user's session, the user's connection, or other characteristics of the request.
  • This filtering may be user configurable or may be autonomously enforced by a registered claims provider.
  • the approach described below may be implemented as a computer process, a computing system or as an article of manufacture such as a computer program product.
  • the computer program product may be a computer storage medium readable by a computer system and encoding a computer program of instructions for executing a computer process.
  • the computer program product may also be a propagated signal on a carrier readable by a computing system and encoding a computer program of instructions for executing a computer process.
  • FIG. 1 is a block diagram illustrating an exemplary software architecture for use in a non-federated environment.
  • FIG. 2 is a block diagram illustrating an exemplary software architecture for use in a federated environment.
  • FIG. 3 is a sequence diagram illustrating the time ordered sequence of interactions involved in handling an access request in a non-federated environment.
  • FIG. 4 is a sequence diagram illustrating the time ordered sequence of interactions involved in handling an access request in a federated environment.
  • FIG. 5 is a block diagram illustrating significant trust relationships involved in handling an access request in a non-federated environment.
  • FIG. 6 is a block diagram illustrating significant trust relationships involved in handling an access request in a federated environment.
  • a federation is a collection of trust domains that have established mutual pair-wise trust.
  • a non-federated environment is where all relevant entities are contained within a single trust domain.
  • FIG. 1 presents an exemplary architecture for implementing the concepts of the present disclosure in a non-federated environment.
  • This architecture builds upon the brokered authentication security model.
  • the client 100 and the service 102 do not have a direct trust relationship and so do not handle authentication or other access requests directly.
  • a broker such as the identity provider security token service (IP-STS) 104 maintains a trust relationship with each of the client and the service and provides access control. See FIG. 5 and associated discussion below for more details.
  • IP-STS identity provider security token service
  • FIG. 5 While “service” is used herein to describe the entity which receives the request from the client, that term is intended to encompass the broad concept of a “relying party” which needs to authenticate or authorize the client before supplying some form of data or service.
  • a claim is an assertion made about a logical object such as the name or identity of the object; an encryption key held by the object; a group of which the object is a member; or a privilege, capability, or other characteristic of the object.
  • An object is any system entity that can be granted security rights or that makes assertions about security or identity.
  • An object might be a client, a service, or other resource but might also be any of various other entities having the requisite capabilities.
  • access control for client 100 and service 102 begins when claims are asserted by an IP-STS 104 and packaged in a security token. That token is provided to the client 100 in response to authentication request 112 and passed on to any service 102 to which it sends a service request 108 . Note that the initial request could be triggered by an attempt to use a service which requires authentication. The service 102 then verifies the token 110 and uses the contained claims to determine whether to grant the requested access. The security token could be verified with the issuing IP-STS but typically this interaction is not needed because the token itself can contain proof of a relationship with the broker, such as public key encryption, which can be used by the service to perform the token verification 110 .
  • the claims providers 106 plug in to the IP-STS 104 providing extensibility and flexibility in the types of claims which can be supported by the system.
  • the service 102 may be the object being protected or it may be an application which provides access to a protected object such as file system providing access to a file.
  • the sequence diagram of FIG. 3 illustrates an exemplary time ordered sequence of interactions involved in a non-federated authentication.
  • the original service request 300 is sent from the client 100 to the service 102 . Where the client 100 has not already been authenticated, the service 102 responds with an authentication request 302 . Optionally, this original request, or subsequent interaction with the service, may identify which claim or claims could be used for authentication.
  • the client 100 sends authentication request 304 to the IP-STS 104 asking that a security token be generated containing appropriate claims.
  • the IP-STS 104 must authenticate the client 100 for its own purposes, assuming that this has not already occurred. This authentication will have to satisfy the greater of two sets of requirements: the claims needed to satisfy the service, and the claims needed to satisfy the minimum threshold of the IP-STS itself. Based on these requirements, one or more claims providers 106 may be identified which are capable of authenticating the client 100 . These options will preferably be presented to the user who is interacting with the client 100 . The user will select one option for use and an authentication request 306 will be sent to the selected claims provider 106 . Alternatively, a single claim may be selected by the system and presented to the user with no option for the user to make a selection.
  • the user When the selection is presented, the user will interact with the claims provider 106 to supply the required criteria (i.e. password, biometric scan, magnetic card swipe, etc.). Once the user has supplied the proper information, the claims provider 106 will generate and populate a security token containing the claims which the selected claims provider 106 can assert about the user. This token is returned to the IP-STS 104 as a part of the response 308 . Alternatively, the token could have been generated as an empty token by the IP-STS 104 and supplied to the claims provider 106 .
  • the required criteria i.e. password, biometric scan, magnetic card swipe, etc.
  • An alternative embodiment may limit the set of claims providers 106 which is made available by characteristics of either the user or the client or both. For example, in a commercial environment, the option to use a proximity key for authentication may not be presented to an hourly employee because such keys are only issued to salaried personnel. Similarly, an option to swipe a credit card or employee badge may not be presented where the client (or the link to the client) lacks the security to protect the information.
  • the client has been authenticated to the IP-STS 104 .
  • the original token may contain sufficient claims to satisfy the needs of the service 102 , or it may not.
  • a process known as claims augmentation can be used to provide any missing claims or to provide supplemental claims which will support authentication and/or authorization of the client.
  • an augmentation request 310 containing the original security token is sent to each claims provider 106 which is registered with the IP-STS 104 .
  • Each claims provider will add to the security token those claims which it can assert about the user.
  • the security token will contain a superset of claims which can be asserted about the client.
  • the claims providers 106 which are contacted during claims augmentation, or the claims returned by the claims providers may be limited by the authentication level of the client.
  • a client which authenticated using the highest available level of authentication i.e., ID card scan plus biometric scan
  • a client which authenticated using the lowest available level of authentication i.e., email address plus password
  • would not be able to obtain augmented claims considered to be of a higher level i.e., a PKI public key might be withheld).
  • the fully augmented security token is returned to the client 100 as a part of the authorization response 314 to authorization request 304 .
  • This token is then provided to the service 102 as part of the authorization response 316 to authorization request 302 .
  • the service 102 will validate the token and examine the contained claims to confirm that its authentication needs are satisfied. It may optionally also perform authorization for the user based on the available claims. With the client 100 properly authenticated, the service 102 will now provide the service 318 which was originally requested.
  • the level of trust may vary, but it typically includes authentication and might include authorization.
  • Multiple domains can be supported, but the architecture and interactions for a single pair of domains are directly extensible and so will be used for clarity.
  • the client trust domain 220 there are two trust domains overlaid on the exemplary architecture: the client trust domain 220 and the service trust domain 222 .
  • the client 100 , IP-STS 104 , and claims provider 106 which are in the client trust domain 220 are the same entities as discussed above for the non-federated environment of FIG. 1 but their interactions are slightly altered in some cases.
  • Service 102 is the same entity as for the non-federated environment, but it now exists in a different trust domain. Because of this, it no longer has a trust relationship with the IP-STS 104 and so can not rely on it for access control.
  • the only trust relationships which cross trust domain boundaries are those between brokers, more specifically STS's.
  • a relying party STS (RP-STS) 200 exists in the server trust domain to serve those entities within that domain. In a preferred embodiment, it has an associated set of relying party claims providers 202 .
  • the RP-STS 200 and relying party claims providers 202 may be implemented as being identical to the IP-STS 104 and identity provider claims providers 106 . This allows for symmetrical operations where a client in the server trust domain needs to access a service in the client trust domain.
  • Interactions 300 through 314 proceed in substantially the same manner as for the non-federated environment.
  • the authorization requests preferably identify that the request is for a different trust domain and preferably identifies the domain for which authorization is being requested. This allows the IP-STS 104 to make any required changes or additions to the structure or content of the security token so that it can be consumed by the RP-STS 200 rather than a service.
  • the client 100 When the client 100 receives the security token after authenticating with the IP-STS 104 it must perform an additional task before it can present a token to the service 102 . Because the security token was generated in a different trust domain, it will not be accepted by the service 102 . The token must be presented to the RP-STS 200 in order to obtain a token which can be used in the service trust domain 222 . This is represented by authentication relationship 204 in FIG. 2 and by interactions 404 - 410 below. In an exemplary embodiment, the RP-STS 200 to which the token must be presented will be identified by the service 102 in authentication request 302 . The client 100 sends an authentication request 400 to the RP-STS 200 and supplies the security token generated by the IP-STS 104 .
  • the RP-STS confirms that it has a trust relationship with the issuing IP-STS 104 , verifies the security token, and confirms that it contains at least one claim which is sufficient to authenticate the client 100 to entities in the server trust domain. If such a claim is found, the RP-STS 200 issues a security token for the server trust domain containing at least one claim which is valid in the server trust domain and copies some or all of the claims found in the security token issued by the IP-STS 104 . It then performs its own claims augmentation process 206 (see FIG. 2 ) in the same manner as described above for the IP-STS 104 .
  • Each of the relying party claims providers 202 are contacted 402 and each adds to the security token 404 such claims as it can assert for the client 100 based on the claims provided by the RP-STS 200 .
  • the fully augmented security token is returned to the client 100 in the response 406 .
  • This token is then presented 316 to the service which verifies the token and provides service 318 as described above.
  • the two trust domains may utilize different formats, content, encoding, or other differences for their security tokens.
  • the process of issuing the token for the service trust domain 222 may comprise mapping claims from the token issued by the IP-STS 104 into the local format in place of or in addition to copying the claims.
  • the exemplary claims based brokered authentication approach discussed herein incorporates trust relationships between the various entities. As discussed above, there is not typically a direct trust relationship between the client and the service. Instead the relationships illustrated in FIG. 5 predominate for a non-federated environment.
  • the trust relationship 500 between client 100 and IP-STS 104 supports the issuance of a security token to the client which contains claims made about the client by the IP-STS 104 .
  • trust relationship 502 between service 102 and IP-STS 104 supports the acceptance and verification of claims made by the IP-STS 104 about the client 100 .
  • the trust relationship 504 between the IP-STS 104 and the claims provider(s) 106 allows for an extensible set of claims to be asserted by the IP-STS 104 based on the claims made by each of the claims providers.
  • this trust relationship 504 is dynamically established when a claims provider 106 registers with the IP-STS 104 . Registration makes the claims provider 106 known to the IP-STS 104 and allows those claims supported by the claims provider 106 to be used by the IP-STS 104 . As part of the registration process, the user performing the registration can optionally specify the scope to which the claims provider applies. This scope specification can take at least two forms.
  • the first involves the user selecting one or more of the services, websites, directories, or other logical objects, or types of object, which are supported by the IP-STS 104 as being able to use the claims provider 106 or a specific claim assertable by it.
  • the second form consists of specifying a set of rules which identify the scenarios in which the claims provider 106 can be used. For example, where an application, such as a resource management system is acting as a claims provider, its use may be limited to situations in which the user being authenticated is logged in to a system on the internal network. Conversely, authentication via a biometric scan may only be made available to external users where there is a need for stronger authentication
  • a similar contextual limitation may be applied by the claims provider itself at the time when the user is being authenticated.
  • User context information (such as host ID, subscription data, user ID, etc.) can be provided to each of the claims providers 106 . Each may then apply its own internal rules to determine which of its supported claims it will make available. This allows the claims provider 106 to trim the set of claims that it will expose to fit the circumstances.
  • FIG. 6 illustrates the significant trust relationships in a federated environment. Relationships 500 and 504 are the same as for the non-federated environment. As discussed above, the service 102 and the IP-STS 104 can not have a direct trust relationship because they are in different trust domains 220 and 222 . Instead, service 102 has a trust relationship with the RP-STS 200 which is located within its trust domain 222 . This relationship serves the same purpose as trust relationship 502 in the non-federated environment, providing for the acceptance and verification of claims asserted by the RP-STS 200 . Trust relationship 604 between the RP-STS 200 and the RP claims provider(s) 202 is similar to relationship 504 and enables the RP-STS 200 having an extensible set of claims which it can assert.
  • Trust relationship 600 is unique to the federated environment. Where the IP-STS 104 in the client trust domain 220 has a trust relationship 600 with the RP-STS 200 in the service trust domain 222 a claim asserted by the IP-STS 104 can be accepted by the RP-STS 200 and optionally translated into a local claim asserted by the RP-STS 200 . This approach allows the client 100 and service 102 to continue relying solely upon their local STS in the federated environment as in the non-federated environment. The trust relationships which bridge trust domain boundaries are solely between STSs. These relationships are established by security personnel for each RP-STS 200 .
  • the STSs will authenticate each other and establish a secure communications link. They will then exchange information about the claims which each STS is able to assert, including those available from their respective claims providers 106 and 202 . The security personnel will then select which of the available claims from the other STS will be accepted and what, if any, mapping will be performed to local claims. They may also be mapped to other representations of security information such as roles or groups used for authentication and authorization by more conventional models.
  • the RP-STS 200 will be configured to generate a security token which segregates claims into two distinct categories when relying on claims from a trusted IP-STS 104 .
  • a first set will contain those local claims generated by the RP-STS 200 and may be further subdivided into claims which identify the entity in question and those which specify an attribute or characteristic of the entity.
  • a second set of claims will be those received from the IP-STS 104 , typically not subdivided. This provides ease of access to those claims most likely to be used by the local service 102 while still allowing the original claims asserted by the IP-STS 104 to be used where applicable.
  • Claims providers are primarily a mechanism for providing access control extensibility. Rather than providing a fixed set of claims which can be used for authentication and/or authorization, an STS can provide, and validate, claims provided by any registered claims provider. Any one STS may have a variety of claims providers available and that set of claims providers can be dynamic. While claims providers can be purpose built applications whose main focus is to assert and validate claims, they may also be existing applications which already implement a “claim” and can now expose this information to the STS for use in the security model.
  • e-mail is an e-mail system.
  • Most e-mail systems support the concept of a distribution list (DL).
  • a user can define a list of e-mail users who can be selected as a group to receive certain messages. It is likely that this DL comprises a set of users who have a common need to access a certain type of data (i.e. sales personnel who need to see sales figures). While e-mail is one forum for distribution of this data, it is not the only one. It is likely that there will be files in a files system and pages on a web server which are also of interest to this group and it may be desirable to restrict access to only this group. In most security models, it is necessary to establish a role or group which corresponds to the DL in order to implement this goal.
  • the DL and the role/group are not logically linked and need to be maintained separately.
  • the concepts of the present disclosure allow the mail system to be modified to serve as a claims provider. It can then expose the distribution lists as claims so that they can be used directly to authenticate or authorize users.
  • Another example is a resource management application which maintains organization charts. It is common to need to restrict access to certain types of information by where a user appears on an organization chart. Financial performance data may be restricted to senior management. Critical technical data may only be available to the research and development (R&D) staff. Sales projections are only accessible by the sales staff. As above, most security models will require that a role or group be established and maintained in parallel to the organization chart. Exemplary implementations of the present disclosure allow the resource management application to function as a claims provider exposing the organization chart as a set of claims. Additional business logic which is normally internal to the resource management application can be used to support more complex claims.
  • a claims provider 106 becomes involved in the security model.
  • the first is when an administrator, or other personnel, specifies the security policies to be used for a service ( 102 in the figures) or other entity. This would include selecting the claims which are deemed sufficient to allow a user to access the service 102 .
  • This process would typically include the administrator being presented a list of the available claims providers and the claim or claims which each of them can assert. The administrator then selects some or all of the available claims which will be considered sufficient to satisfy the security needs for the service being configured. This process is also applicable to files, websites, and other entities for which security is provided.
  • the second time the claims provider 106 becomes involved is when the client 100 attempts to access the service 102 .
  • the initial request will trigger a response from the service which indicates that the user must authenticate and which may specify one or more claims, or sets of claims, which will suffice for authentication.
  • the service is configured to accept more than one claim, or sets of claims, and the STS has more than one matching claim available for use, the user has more than one option for authenticating to the same service.
  • the client will then provide an interface to the user, either directly or by activating a dedicated application such as an access manager, which allows the user to select a claim which is available to them and which also satisfies the requirements specified by the service.
  • each method of authentication may provide the user with a different set of privileges, or authorizations, with the service and may require a different set of information from the user in order to authenticate. This provides the user with the capability to select the claim which exposes the minimal amount of information while still obtaining the level of service required.
  • the third involvement of the claims provider 106 is the validation of the claim after the security token has been generated and delivered to the service 102 as described above.
  • This step may be optional depending on the implementation of the token and on the relationship between the service and its local STS.
  • the token may be digitally signed, such as by using a PKI key, in such a way that the service can verify the token without interacting with the STS or the claims provider.
  • Another exemplary embodiment may provide verification of the token via the STS which may then rely on the claims provider to verify its claim at that time. This approach may be advantageous in situation where claims are dependent upon highly dynamic data or business logic.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

An extensible mechanism for providing access control for logical objects in a network environment. A security broker is able to dynamically register one or more claims providers, each of which can assert one or more claims about logical objects. The claims providers may be purpose built or may be third party applications which expose data or business rules for use. Claims may be augmented by additional claims providers after the original claim is asserted. The applicability of claims may be scope limited either at the time the claims provider is registered or when the user requests that a security token be issued.

Description

    BACKGROUND
  • In a computer network where a variety of data, services and other logical objects are made available to a user population, security controls must be provided to regulate access. These controls balance protection for these objects against flexibility and ease of use by the administrators and end users. Users may also wish to limit the amount of identifying information which they must provide in order to gain access so that the quantity of their personal information transmitted over the network is minimized.
  • For an administrator, it is desirable that the security policies to be enforced be selectable by either type of object or for each object individually. Where necessary, different levels of security should be available, and easily configurable, to match a wide range of needs. Redundant information and duplicate effort should be minimized.
  • For an end user, it should be easy to gain access to a secured object and the experience of gaining access should be uniform across all objects. Where multiple methods are available, the user should be presented with a choice of which to use.
  • For all users, the methods used to control access should reflect the real world. Where the user is a member of a work group with similar needs, that group should be available to identify those users and their access rights. Where similar groups are applicable across a variety of objects, all of those objects should be able to reference the same logical group and see membership changes at substantially the same time. Further, access control should not be limited to a single concept such as groups. Existing, and new, concepts and rules used by one service or application should be available for use with other protected objects.
  • SUMMARY
  • This Summary is provided to introduce in a simplified form a selection of concepts that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
  • Various aspects of the subject matter disclosed herein are related to securing objects in a computer network environment building upon the concepts of brokered authentication and claims based security. The disclosure addresses providing an extensible set of claims through the capability of dynamically registering claims providers rather than using a fixed set of claims.
  • Other aspects relate to specifying a scope to which the claims asserted by a claims provider will be applicable at the time the claims provider is registered and then enforcing that scope when an access request is received.
  • Still other aspects relate to providing augmented claims by polling the registered claims providers once an initial claim, or set of claims, is obtained in order to acquire additional claims which may be identified.
  • Additional aspects relate to filtering the set of claims which will be provided based upon one or more characteristics of the user, the user's session, the user's connection, or other characteristics of the request. This filtering may be user configurable or may be autonomously enforced by a registered claims provider.
  • The approach described below may be implemented as a computer process, a computing system or as an article of manufacture such as a computer program product. The computer program product may be a computer storage medium readable by a computer system and encoding a computer program of instructions for executing a computer process. The computer program product may also be a propagated signal on a carrier readable by a computing system and encoding a computer program of instructions for executing a computer process.
  • A more complete appreciation of the above summary can be obtained by reference to the accompanying drawings, which are briefly summarized below, to the following detailed description of present embodiments, and to the appended claims.
  • BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS
  • FIG. 1 is a block diagram illustrating an exemplary software architecture for use in a non-federated environment.
  • FIG. 2 is a block diagram illustrating an exemplary software architecture for use in a federated environment.
  • FIG. 3 is a sequence diagram illustrating the time ordered sequence of interactions involved in handling an access request in a non-federated environment.
  • FIG. 4 is a sequence diagram illustrating the time ordered sequence of interactions involved in handling an access request in a federated environment.
  • FIG. 5 is a block diagram illustrating significant trust relationships involved in handling an access request in a non-federated environment.
  • FIG. 6 is a block diagram illustrating significant trust relationships involved in handling an access request in a federated environment.
  • DETAILED DESCRIPTION
  • This detailed description is made with reference to the accompanying drawings, which form a part hereof, and which show, by way of illustration, specific exemplary embodiments. These embodiments are described in sufficient detail to enable those skilled in the art to practice what is taught below, and it is to be understood that other embodiments may be utilized and that logical, mechanical, electrical, and other changes may be made without departing from the spirit or scope of the subject matter. The following detailed description is, therefore, not to be taken in a limiting sense, and its scope is defined only by the appended claims.
  • Throughout this document, much of the discussion is presented in terms of authentication and authorization. These are two well understood aspects of the larger issue of controlling access to logical objects on a network to which the present disclosure is applicable. These aspects are used for illustrative purposes and are not intended to limit the scope. Herein, securing an object and controlling access to an object are considered to be synonymous.
  • Architecture and Interactions
  • The concepts of the present disclosure are applicable to both federated and non-federated network environments. For the purposes of this disclosure, a federation is a collection of trust domains that have established mutual pair-wise trust. Conversely, a non-federated environment is where all relevant entities are contained within a single trust domain.
  • FIG. 1 presents an exemplary architecture for implementing the concepts of the present disclosure in a non-federated environment. This architecture builds upon the brokered authentication security model. In this exemplary architecture, the client 100 and the service 102 do not have a direct trust relationship and so do not handle authentication or other access requests directly. Instead, a broker, such as the identity provider security token service (IP-STS) 104 maintains a trust relationship with each of the client and the service and provides access control. See FIG. 5 and associated discussion below for more details. While “service” is used herein to describe the entity which receives the request from the client, that term is intended to encompass the broad concept of a “relying party” which needs to authenticate or authorize the client before supplying some form of data or service.
  • The exemplary architecture of FIG. 1 also builds upon the claims based security model and the use of security tokens to communicate claims. A claim is an assertion made about a logical object such as the name or identity of the object; an encryption key held by the object; a group of which the object is a member; or a privilege, capability, or other characteristic of the object. An object is any system entity that can be granted security rights or that makes assertions about security or identity. An object might be a client, a service, or other resource but might also be any of various other entities having the requisite capabilities.
  • In an exemplary implementation, access control for client 100 and service 102 begins when claims are asserted by an IP-STS 104 and packaged in a security token. That token is provided to the client 100 in response to authentication request 112 and passed on to any service 102 to which it sends a service request 108. Note that the initial request could be triggered by an attempt to use a service which requires authentication. The service 102 then verifies the token 110 and uses the contained claims to determine whether to grant the requested access. The security token could be verified with the issuing IP-STS but typically this interaction is not needed because the token itself can contain proof of a relationship with the broker, such as public key encryption, which can be used by the service to perform the token verification 110. The claims providers 106 plug in to the IP-STS 104 providing extensibility and flexibility in the types of claims which can be supported by the system. Note that in this scenario the service 102 may be the object being protected or it may be an application which provides access to a protected object such as file system providing access to a file.
  • The sequence diagram of FIG. 3 illustrates an exemplary time ordered sequence of interactions involved in a non-federated authentication. The original service request 300 is sent from the client 100 to the service 102. Where the client 100 has not already been authenticated, the service 102 responds with an authentication request 302. Optionally, this original request, or subsequent interaction with the service, may identify which claim or claims could be used for authentication. The client 100 sends authentication request 304 to the IP-STS 104 asking that a security token be generated containing appropriate claims.
  • At this point, the IP-STS 104 must authenticate the client 100 for its own purposes, assuming that this has not already occurred. This authentication will have to satisfy the greater of two sets of requirements: the claims needed to satisfy the service, and the claims needed to satisfy the minimum threshold of the IP-STS itself. Based on these requirements, one or more claims providers 106 may be identified which are capable of authenticating the client 100. These options will preferably be presented to the user who is interacting with the client 100. The user will select one option for use and an authentication request 306 will be sent to the selected claims provider 106. Alternatively, a single claim may be selected by the system and presented to the user with no option for the user to make a selection. When the selection is presented, the user will interact with the claims provider 106 to supply the required criteria (i.e. password, biometric scan, magnetic card swipe, etc.). Once the user has supplied the proper information, the claims provider 106 will generate and populate a security token containing the claims which the selected claims provider 106 can assert about the user. This token is returned to the IP-STS 104 as a part of the response 308. Alternatively, the token could have been generated as an empty token by the IP-STS 104 and supplied to the claims provider 106.
  • An alternative embodiment may limit the set of claims providers 106 which is made available by characteristics of either the user or the client or both. For example, in a commercial environment, the option to use a proximity key for authentication may not be presented to an hourly employee because such keys are only issued to salaried personnel. Similarly, an option to swipe a credit card or employee badge may not be presented where the client (or the link to the client) lacks the security to protect the information.
  • At this point, the client has been authenticated to the IP-STS 104. The original token may contain sufficient claims to satisfy the needs of the service 102, or it may not. A process known as claims augmentation can be used to provide any missing claims or to provide supplemental claims which will support authentication and/or authorization of the client. As part of the augmentation process an augmentation request 310 containing the original security token is sent to each claims provider 106 which is registered with the IP-STS 104. Each claims provider will add to the security token those claims which it can assert about the user. After all claims providers have responded, the security token will contain a superset of claims which can be asserted about the client.
  • Alternatively, the claims providers 106 which are contacted during claims augmentation, or the claims returned by the claims providers, may be limited by the authentication level of the client. For example a client which authenticated using the highest available level of authentication (i.e., ID card scan plus biometric scan) would be able to obtain all available claims during augmentation. But a client which authenticated using the lowest available level of authentication (i.e., email address plus password) would not be able to obtain augmented claims considered to be of a higher level (i.e., a PKI public key might be withheld).
  • The fully augmented security token is returned to the client 100 as a part of the authorization response 314 to authorization request 304. This token is then provided to the service 102 as part of the authorization response 316 to authorization request 302. The service 102 will validate the token and examine the contained claims to confirm that its authentication needs are satisfied. It may optionally also perform authorization for the user based on the available claims. With the client 100 properly authenticated, the service 102 will now provide the service 318 which was originally requested.
  • Where the concepts of the present disclosure are applied in a federated environment, additional entities and additional trust relationships are needed. The level of trust may vary, but it typically includes authentication and might include authorization. Multiple domains can be supported, but the architecture and interactions for a single pair of domains are directly extensible and so will be used for clarity.
  • Referring to FIG. 2 it can be seen that there are two trust domains overlaid on the exemplary architecture: the client trust domain 220 and the service trust domain 222. The client 100, IP-STS 104, and claims provider 106 which are in the client trust domain 220 are the same entities as discussed above for the non-federated environment of FIG. 1 but their interactions are slightly altered in some cases. Service 102 is the same entity as for the non-federated environment, but it now exists in a different trust domain. Because of this, it no longer has a trust relationship with the IP-STS 104 and so can not rely on it for access control. The only trust relationships which cross trust domain boundaries are those between brokers, more specifically STS's. A relying party STS (RP-STS) 200 exists in the server trust domain to serve those entities within that domain. In a preferred embodiment, it has an associated set of relying party claims providers 202. The RP-STS 200 and relying party claims providers 202 may be implemented as being identical to the IP-STS 104 and identity provider claims providers 106. This allows for symmetrical operations where a client in the server trust domain needs to access a service in the client trust domain.
  • Referring to the sequence diagram of FIG. 4 the interactions of the entities in a federated environment can be seen. Where interactions are numbered identically with FIG. 3 they can be understood to be the same interactions as described for the non-federated environment unless a difference is identified herein. Interactions 300 through 314 proceed in substantially the same manner as for the non-federated environment. One difference is that the authorization requests preferably identify that the request is for a different trust domain and preferably identifies the domain for which authorization is being requested. This allows the IP-STS 104 to make any required changes or additions to the structure or content of the security token so that it can be consumed by the RP-STS 200 rather than a service.
  • When the client 100 receives the security token after authenticating with the IP-STS 104 it must perform an additional task before it can present a token to the service 102. Because the security token was generated in a different trust domain, it will not be accepted by the service 102. The token must be presented to the RP-STS 200 in order to obtain a token which can be used in the service trust domain 222. This is represented by authentication relationship 204 in FIG. 2 and by interactions 404-410 below. In an exemplary embodiment, the RP-STS 200 to which the token must be presented will be identified by the service 102 in authentication request 302. The client 100 sends an authentication request 400 to the RP-STS 200 and supplies the security token generated by the IP-STS 104. The RP-STS confirms that it has a trust relationship with the issuing IP-STS 104, verifies the security token, and confirms that it contains at least one claim which is sufficient to authenticate the client 100 to entities in the server trust domain. If such a claim is found, the RP-STS 200 issues a security token for the server trust domain containing at least one claim which is valid in the server trust domain and copies some or all of the claims found in the security token issued by the IP-STS 104. It then performs its own claims augmentation process 206 (see FIG. 2) in the same manner as described above for the IP-STS 104. Each of the relying party claims providers 202 are contacted 402 and each adds to the security token 404 such claims as it can assert for the client 100 based on the claims provided by the RP-STS 200. The fully augmented security token is returned to the client 100 in the response 406. This token is then presented 316 to the service which verifies the token and provides service 318 as described above.
  • In an exemplary embodiment, the two trust domains may utilize different formats, content, encoding, or other differences for their security tokens. In this case the process of issuing the token for the service trust domain 222 may comprise mapping claims from the token issued by the IP-STS 104 into the local format in place of or in addition to copying the claims.
  • Trust Relationships
  • The exemplary claims based brokered authentication approach discussed herein incorporates trust relationships between the various entities. As discussed above, there is not typically a direct trust relationship between the client and the service. Instead the relationships illustrated in FIG. 5 predominate for a non-federated environment. The trust relationship 500 between client 100 and IP-STS 104 supports the issuance of a security token to the client which contains claims made about the client by the IP-STS 104. Similarly, trust relationship 502 between service 102 and IP-STS 104 supports the acceptance and verification of claims made by the IP-STS 104 about the client 100.
  • The trust relationship 504 between the IP-STS 104 and the claims provider(s) 106 allows for an extensible set of claims to be asserted by the IP-STS 104 based on the claims made by each of the claims providers. In an exemplary embodiment, this trust relationship 504 is dynamically established when a claims provider 106 registers with the IP-STS 104. Registration makes the claims provider 106 known to the IP-STS 104 and allows those claims supported by the claims provider 106 to be used by the IP-STS 104. As part of the registration process, the user performing the registration can optionally specify the scope to which the claims provider applies. This scope specification can take at least two forms. The first involves the user selecting one or more of the services, websites, directories, or other logical objects, or types of object, which are supported by the IP-STS 104 as being able to use the claims provider 106 or a specific claim assertable by it. The second form consists of specifying a set of rules which identify the scenarios in which the claims provider 106 can be used. For example, where an application, such as a resource management system is acting as a claims provider, its use may be limited to situations in which the user being authenticated is logged in to a system on the internal network. Conversely, authentication via a biometric scan may only be made available to external users where there is a need for stronger authentication
  • A similar contextual limitation may be applied by the claims provider itself at the time when the user is being authenticated. User context information (such as host ID, subscription data, user ID, etc.) can be provided to each of the claims providers 106. Each may then apply its own internal rules to determine which of its supported claims it will make available. This allows the claims provider 106 to trim the set of claims that it will expose to fit the circumstances.
  • FIG. 6 illustrates the significant trust relationships in a federated environment. Relationships 500 and 504 are the same as for the non-federated environment. As discussed above, the service 102 and the IP-STS 104 can not have a direct trust relationship because they are in different trust domains 220 and 222. Instead, service 102 has a trust relationship with the RP-STS 200 which is located within its trust domain 222. This relationship serves the same purpose as trust relationship 502 in the non-federated environment, providing for the acceptance and verification of claims asserted by the RP-STS 200. Trust relationship 604 between the RP-STS 200 and the RP claims provider(s) 202 is similar to relationship 504 and enables the RP-STS 200 having an extensible set of claims which it can assert.
  • Trust relationship 600 is unique to the federated environment. Where the IP-STS 104 in the client trust domain 220 has a trust relationship 600 with the RP-STS 200 in the service trust domain 222 a claim asserted by the IP-STS 104 can be accepted by the RP-STS 200 and optionally translated into a local claim asserted by the RP-STS 200. This approach allows the client 100 and service 102 to continue relying solely upon their local STS in the federated environment as in the non-federated environment. The trust relationships which bridge trust domain boundaries are solely between STSs. These relationships are established by security personnel for each RP-STS 200. In an exemplary embodiment, for each IP-STS in a different trust domain, the STSs will authenticate each other and establish a secure communications link. They will then exchange information about the claims which each STS is able to assert, including those available from their respective claims providers 106 and 202. The security personnel will then select which of the available claims from the other STS will be accepted and what, if any, mapping will be performed to local claims. They may also be mapped to other representations of security information such as roles or groups used for authentication and authorization by more conventional models.
  • In an exemplary embodiment, the RP-STS 200 will be configured to generate a security token which segregates claims into two distinct categories when relying on claims from a trusted IP-STS 104. A first set will contain those local claims generated by the RP-STS 200 and may be further subdivided into claims which identify the entity in question and those which specify an attribute or characteristic of the entity. A second set of claims will be those received from the IP-STS 104, typically not subdivided. This provides ease of access to those claims most likely to be used by the local service 102 while still allowing the original claims asserted by the IP-STS 104 to be used where applicable.
  • Claims Providers
  • Claims providers are primarily a mechanism for providing access control extensibility. Rather than providing a fixed set of claims which can be used for authentication and/or authorization, an STS can provide, and validate, claims provided by any registered claims provider. Any one STS may have a variety of claims providers available and that set of claims providers can be dynamic. While claims providers can be purpose built applications whose main focus is to assert and validate claims, they may also be existing applications which already implement a “claim” and can now expose this information to the STS for use in the security model.
  • One example of such an application is an e-mail system. Most e-mail systems support the concept of a distribution list (DL). A user can define a list of e-mail users who can be selected as a group to receive certain messages. It is likely that this DL comprises a set of users who have a common need to access a certain type of data (i.e. sales personnel who need to see sales figures). While e-mail is one forum for distribution of this data, it is not the only one. It is likely that there will be files in a files system and pages on a web server which are also of interest to this group and it may be desirable to restrict access to only this group. In most security models, it is necessary to establish a role or group which corresponds to the DL in order to implement this goal. However, the DL and the role/group are not logically linked and need to be maintained separately. The concepts of the present disclosure allow the mail system to be modified to serve as a claims provider. It can then expose the distribution lists as claims so that they can be used directly to authenticate or authorize users.
  • Another example is a resource management application which maintains organization charts. It is common to need to restrict access to certain types of information by where a user appears on an organization chart. Financial performance data may be restricted to senior management. Critical technical data may only be available to the research and development (R&D) staff. Sales projections are only accessible by the sales staff. As above, most security models will require that a role or group be established and maintained in parallel to the organization chart. Exemplary implementations of the present disclosure allow the resource management application to function as a claims provider exposing the organization chart as a set of claims. Additional business logic which is normally internal to the resource management application can be used to support more complex claims. For example, senior R&D managers can be selected to receive sensitive risk data for ongoing projects while sales personnel meeting specified sales goals can be granted access to “members only” web pages. Each of these sets of claims can be dynamic, updating to follow the organization charts and sales figures as they change. This type of flexibility is difficult to achieve without claims providers.
  • There are three significant times where a claims provider 106 becomes involved in the security model. The first is when an administrator, or other personnel, specifies the security policies to be used for a service (102 in the figures) or other entity. This would include selecting the claims which are deemed sufficient to allow a user to access the service 102. This process would typically include the administrator being presented a list of the available claims providers and the claim or claims which each of them can assert. The administrator then selects some or all of the available claims which will be considered sufficient to satisfy the security needs for the service being configured. This process is also applicable to files, websites, and other entities for which security is provided.
  • The second time the claims provider 106 becomes involved is when the client 100 attempts to access the service 102. As discussed above with respect to the sequence diagrams, the initial request will trigger a response from the service which indicates that the user must authenticate and which may specify one or more claims, or sets of claims, which will suffice for authentication. Where the service is configured to accept more than one claim, or sets of claims, and the STS has more than one matching claim available for use, the user has more than one option for authenticating to the same service. The client will then provide an interface to the user, either directly or by activating a dedicated application such as an access manager, which allows the user to select a claim which is available to them and which also satisfies the requirements specified by the service. In an exemplary embodiment, each method of authentication may provide the user with a different set of privileges, or authorizations, with the service and may require a different set of information from the user in order to authenticate. This provides the user with the capability to select the claim which exposes the minimal amount of information while still obtaining the level of service required.
  • The third involvement of the claims provider 106 is the validation of the claim after the security token has been generated and delivered to the service 102 as described above. This step may be optional depending on the implementation of the token and on the relationship between the service and its local STS. In an exemplary embodiment, the token may be digitally signed, such as by using a PKI key, in such a way that the service can verify the token without interacting with the STS or the claims provider. Another exemplary embodiment may provide verification of the token via the STS which may then rely on the claims provider to verify its claim at that time. This approach may be advantageous in situation where claims are dependent upon highly dynamic data or business logic.
  • Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims. It will be understood by those skilled in the art that many changes in construction and widely differing embodiments and applications will suggest themselves without departing from the scope of the disclosed subject matter.

Claims (20)

1) An extensible system for providing security claims about a logical object wherein:
(a) a security broker is responsive to a registration request which identifies an unregistered claims provider by recording the identified claims provider as a registered claims provider;
(b) the registered claims provider is responsive to a claims request which identifies a secured object by providing at least one provider security claim asserted about the secured object; and
(c) the security broker is responsive to an access request from a client, the access request identifying a logical object, by:
(i) issuing a claims request to the registered claims provider, the claims request specifying the logical object as the secured object,
(ii) receiving a provider security claim from the claims provider, and
(iii) returning the provider security claim to the client.
2) The system of claim 1 wherein the security broker is further responsive to the registration request by associating an applicable scope with at least one claim which can be asserted by the claims provider and by issuing a claims request only if the logical object is within the applicable scope.
3) The system of claim 2 wherein the applicable scope is specified, at least in part, by specifying one or more logical objects to which the at least one claim is to be applicable.
4) The system of claim 2 wherein the applicable scope is specified, at least in part, by specifying a rule to be applied when generating the security claim to determine whether the at least one claim is applicable.
5) The system of claim 1 wherein the security broker is further responsive to the client access request by issuing an augmentation request comprising an existing provider security claim and a second registered claims provider is responsive to the augmentation request by providing at least one additional provider security claim to the security broker.
6) The system of claim 1 wherein the security broker is further responsive to the client access request by presenting a user with a choice of plural claims which can be asserted by one or more registered claims providers, retrieving a user claim selection, and sending the access request to the claims provider which can assert the selected claim.
7) The system of claim 6 wherein the access request contains a criterion associated with the logical object and the security broker is further responsive to the client access request by only presenting the user with those claims which satisfy the criterion.
8) The system of claim 1 wherein the security broker is further responsive to the client access request by identifying a characteristic of the client and by issuing a claims request to the registered claims provider only if the characteristic matches a predefined value associated with the claims provider.
9) An extensible method of securing access to an object on a computer network, the method comprising:
(a) dynamically registering a claims provider;
(b) receiving a request from a client to access a specified logical object;
(c) requesting a security claim asserted about the specified logical object from the claims provider;
(d) receiving the security claim from the claims provider; and
(e) returning the security claim to the client
10) The method of claim 9 wherein the step of registering a claims provider comprises specifying an applicable scope for the security claim and wherein the step of requesting a security claim only requests the security claim from the claims provider if the logical object is within the applicable scope.
11) The method of claim 10 wherein specifying the applicable scope comprises selecting one or more logical objects to which the at least one claim is to be applicable.
12) The method of claim 10 wherein specifying the applicable scope comprises specifying a rule which will determine whether the at least one claim is applicable to a logical object and wherein the step of restricting the request comprises applying the rule to the specified logical object.
13) The method of claim 9 further comprising the steps of registering a second claims provider and of augmenting the received security claim by requesting a secondary security claim from the second claims provider and receiving the secondary security claim in response and wherein both security claims are returned to the client.
14) The method of claim 13 wherein the step of registering a claims provider comprises specifying an applicable scope the security claim and wherein the step of requesting a security claim only requests the security claim from the claims provider if the logical object is within the applicable scope.
15) The method of claim 14 wherein the step of registering a second claims provider comprises specifying a second applicable scope for the secondary claim and wherein the step of requesting a secondary security claim only requests the secondary security claim from the second claims provider if the logical object is within the second applicable scope.
16) The method of claim 13 wherein the specified steps are performed within a primary trust domain and the following steps are performed in a secondary trust domain:
(a) receiving a request from a client to access the specified logical object, the request comprising the security claim generated in the first trust domain;
(b) verifying the security claim from the first trust domain;
(c) generating a new security claim; and
(d) returning both the existing security claim and the new security claim to the client.
17) The method of claim 16 further comprising the following steps performed in the second trust domain:
(a) dynamically registering a secondary domain claims provider;
(b) augmenting the new security claim by requesting an additional security claim from the second domain claims provider;
(c) receiving the additional security claim from the secondary domain claims provider; and
(d) also returning the additional security claim to the client.
18) The method of claim 17 wherein the step of registering a secondary claims provider comprises specifying an applicable scope for the claim and wherein the step of requesting a security claim only requests a security claim from the claims provider if the logical object is within the applicable scope.
19) An extensible method of securing access to an object on a computer network, the method comprising:
(a) dynamically registering a first claims provider and a second claims provider;
(b) receiving a request from a client to access a specified logical object;
(c) requesting a primary security claim asserted about the specified logical object from the first claims provider;
(d) receiving the primary security claim from the first claims provider;
(e) augmenting the primary security claim by supplying the primary security claim to the second claims provider and requesting a secondary security claim from the second claims provider;
(f) receiving the secondary security claim in response; and
(g) returning the primary security claim and the secondary security claim to the client.
20) The method of claim 20 wherein the steps of registering a primary claims provider and registering a secondary claims provider each comprises specifying an applicable scope for the security claim, wherein the steps of requesting a primary security claim and requesting a secondary security claim each only requests the security claim from the claims provider if the logical object is within the associated applicable scope.
US12/144,880 2008-06-24 2008-06-24 Extensible mechanism for securing objects using claims Active 2032-03-07 US8990896B2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US12/144,880 US8990896B2 (en) 2008-06-24 2008-06-24 Extensible mechanism for securing objects using claims
US14/624,137 US9769137B2 (en) 2008-06-24 2015-02-17 Extensible mechanism for securing objects using claims

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US12/144,880 US8990896B2 (en) 2008-06-24 2008-06-24 Extensible mechanism for securing objects using claims

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US14/624,137 Continuation US9769137B2 (en) 2008-06-24 2015-02-17 Extensible mechanism for securing objects using claims

Publications (2)

Publication Number Publication Date
US20090320103A1 true US20090320103A1 (en) 2009-12-24
US8990896B2 US8990896B2 (en) 2015-03-24

Family

ID=41432697

Family Applications (2)

Application Number Title Priority Date Filing Date
US12/144,880 Active 2032-03-07 US8990896B2 (en) 2008-06-24 2008-06-24 Extensible mechanism for securing objects using claims
US14/624,137 Active 2028-09-18 US9769137B2 (en) 2008-06-24 2015-02-17 Extensible mechanism for securing objects using claims

Family Applications After (1)

Application Number Title Priority Date Filing Date
US14/624,137 Active 2028-09-18 US9769137B2 (en) 2008-06-24 2015-02-17 Extensible mechanism for securing objects using claims

Country Status (1)

Country Link
US (2) US8990896B2 (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012047411A2 (en) * 2010-09-28 2012-04-12 Microsoft Corporation Object security over network
US8689004B2 (en) 2010-11-05 2014-04-01 Microsoft Corporation Pluggable claim providers
US8752158B2 (en) 2012-04-17 2014-06-10 Microsoft Corporation Identity management with high privacy features
US8776255B2 (en) 2010-09-30 2014-07-08 Microsoft Corporation Claims-aware role-based access control
US8990896B2 (en) 2008-06-24 2015-03-24 Microsoft Technology Licensing, Llc Extensible mechanism for securing objects using claims
US9286465B1 (en) * 2012-12-31 2016-03-15 Emc Corporation Method and apparatus for federated single sign on using authentication broker
US9444817B2 (en) 2012-09-27 2016-09-13 Microsoft Technology Licensing, Llc Facilitating claim use by service providers
US20160323376A1 (en) * 2015-05-01 2016-11-03 Vmware, Inc. Sharing information between appliances over a wan via a distributed p2p protocol
CN107810641A (en) * 2015-06-23 2018-03-16 三星电子株式会社 For providing the method for additional content and the terminal using this method in terminal
US10284642B2 (en) 2015-05-01 2019-05-07 Vmware, Inc. Appliance for sharing information over a WAN via a distributed P2P protocol
US11140159B2 (en) * 2016-08-30 2021-10-05 Visa International Service Association Biometric identification and verification among IoT devices and applications
AU2018287526B2 (en) * 2017-06-19 2022-04-28 Citrix Systems, Inc. Systems and methods for dynamic flexible authentication in a cloud service
US20220283959A1 (en) * 2018-05-28 2022-09-08 Intel Corporation Integration of disparate system architectures using configurable isolated memory regions and trust domain conversion bridge
WO2023055505A1 (en) * 2021-09-30 2023-04-06 Microsoft Technology Licensing, Llc. Claim-based authorization across organizations
US11627132B2 (en) * 2018-06-13 2023-04-11 International Business Machines Corporation Key-based cross domain registration and authorization
WO2023230836A1 (en) * 2022-05-31 2023-12-07 Intel Corporation Virtual microcontroller for device authentication in a confidential computing environment

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9577986B1 (en) * 2012-07-27 2017-02-21 Daniel A Dooley Secure data verification technique

Citations (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020095571A1 (en) * 2001-01-18 2002-07-18 Bradee Robert L. Computer security system
US20030149781A1 (en) * 2001-12-04 2003-08-07 Peter Yared Distributed network identity
US6701314B1 (en) * 2000-01-21 2004-03-02 Science Applications International Corporation System and method for cataloguing digital information for searching and retrieval
US20040153558A1 (en) * 2002-10-31 2004-08-05 Mesut Gunduc System and method for providing java based high availability clustering framework
US20050091264A1 (en) * 2003-10-23 2005-04-28 Microsoft Corporation Identity system for use in a computing environment
US20050097351A1 (en) * 2003-10-10 2005-05-05 Bea Systems, Inc. Security provider development model
US20050254514A1 (en) * 2004-05-12 2005-11-17 James Lynn Access control of resources using tokens
US20060015727A1 (en) * 2004-06-30 2006-01-19 International Business Machines Corporation Method and apparatus for identifying purpose and behavior of run time security objects using an extensible token framework
US20060053296A1 (en) * 2002-05-24 2006-03-09 Axel Busboom Method for authenticating a user to a service of a service provider
US20060095335A1 (en) * 2004-10-29 2006-05-04 International Business Machines Corporation Inventory management of resources
US20060123472A1 (en) * 2004-12-07 2006-06-08 Microsoft Corporation Providing tokens to access federated resources
US20060123234A1 (en) * 2004-12-07 2006-06-08 Microsoft Corporation Providing tokens to access extranet resources
US7093298B2 (en) * 2001-08-30 2006-08-15 International Business Machines Corporation Apparatus and method for security object enhancement and management
US20060195420A1 (en) * 2005-02-25 2006-08-31 International Business Machines Corporation System and method of joining data obtained from horizontally and vertically partitioned heterogeneous data stores using string-based location transparent search expressions
US20060206931A1 (en) * 2005-03-14 2006-09-14 Microsoft Corporation Access control policy engine controlling access to resource based on any of multiple received types of security tokens
US7124192B2 (en) * 2001-08-30 2006-10-17 International Business Machines Corporation Role-permission model for security policy administration and enforcement
US20060236382A1 (en) * 2005-04-01 2006-10-19 Hinton Heather M Method and system for a runtime user account creation operation within a single-sign-on process in a federated computing environment
US20060248598A1 (en) * 2005-04-29 2006-11-02 Microsoft Corporation Security claim transformation with intermediate claims
US20060259776A1 (en) * 2005-05-13 2006-11-16 Microsoft Corporation Extensible account authentication system
US20070156691A1 (en) * 2006-01-05 2007-07-05 Microsoft Corporation Management of user access to objects
US7243369B2 (en) * 2001-08-06 2007-07-10 Sun Microsystems, Inc. Uniform resource locator access management and control system and method
US20090165105A1 (en) * 2007-12-20 2009-06-25 Kapil Chaudhry Method and apparatus for communicating between a user device and a user device locating module to allow a partner service to be provided to a user device
US20090193493A1 (en) * 2008-01-28 2009-07-30 Microsoft Corporation Access policy analysis
US20090271856A1 (en) * 2008-04-24 2009-10-29 Novell, Inc. A Delaware Corporation Restricted use information cards
US20120117609A1 (en) * 2010-11-05 2012-05-10 Microsoft Corporation Pluggable Claim Providers
US8220035B1 (en) * 2008-02-29 2012-07-10 Adobe Systems Incorporated System and method for trusted embedded user interface for authentication

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8990896B2 (en) 2008-06-24 2015-03-24 Microsoft Technology Licensing, Llc Extensible mechanism for securing objects using claims

Patent Citations (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6701314B1 (en) * 2000-01-21 2004-03-02 Science Applications International Corporation System and method for cataloguing digital information for searching and retrieval
US20020095571A1 (en) * 2001-01-18 2002-07-18 Bradee Robert L. Computer security system
US7243369B2 (en) * 2001-08-06 2007-07-10 Sun Microsystems, Inc. Uniform resource locator access management and control system and method
US7124192B2 (en) * 2001-08-30 2006-10-17 International Business Machines Corporation Role-permission model for security policy administration and enforcement
US7093298B2 (en) * 2001-08-30 2006-08-15 International Business Machines Corporation Apparatus and method for security object enhancement and management
US20080016232A1 (en) * 2001-12-04 2008-01-17 Peter Yared Distributed Network Identity
US7610390B2 (en) * 2001-12-04 2009-10-27 Sun Microsystems, Inc. Distributed network identity
US20080014931A1 (en) * 2001-12-04 2008-01-17 Peter Yared Distributed Network Identity
US7849204B2 (en) * 2001-12-04 2010-12-07 Oracle America, Inc. Distributed network identity
US8037194B2 (en) * 2001-12-04 2011-10-11 Oracle America, Inc. Distributed network identity
US20030149781A1 (en) * 2001-12-04 2003-08-07 Peter Yared Distributed network identity
US20060053296A1 (en) * 2002-05-24 2006-03-09 Axel Busboom Method for authenticating a user to a service of a service provider
US20040153558A1 (en) * 2002-10-31 2004-08-05 Mesut Gunduc System and method for providing java based high availability clustering framework
US20050097351A1 (en) * 2003-10-10 2005-05-05 Bea Systems, Inc. Security provider development model
US20050091264A1 (en) * 2003-10-23 2005-04-28 Microsoft Corporation Identity system for use in a computing environment
US20050254514A1 (en) * 2004-05-12 2005-11-17 James Lynn Access control of resources using tokens
US7924709B2 (en) * 2004-05-12 2011-04-12 Hewlett-Packard Development Company, L.P. Access control of resources using tokens
US20060015727A1 (en) * 2004-06-30 2006-01-19 International Business Machines Corporation Method and apparatus for identifying purpose and behavior of run time security objects using an extensible token framework
US20060095335A1 (en) * 2004-10-29 2006-05-04 International Business Machines Corporation Inventory management of resources
US20060123234A1 (en) * 2004-12-07 2006-06-08 Microsoft Corporation Providing tokens to access extranet resources
US20060123472A1 (en) * 2004-12-07 2006-06-08 Microsoft Corporation Providing tokens to access federated resources
US7603555B2 (en) * 2004-12-07 2009-10-13 Microsoft Corporation Providing tokens to access extranet resources
US20060195420A1 (en) * 2005-02-25 2006-08-31 International Business Machines Corporation System and method of joining data obtained from horizontally and vertically partitioned heterogeneous data stores using string-based location transparent search expressions
US20060206931A1 (en) * 2005-03-14 2006-09-14 Microsoft Corporation Access control policy engine controlling access to resource based on any of multiple received types of security tokens
US7774830B2 (en) * 2005-03-14 2010-08-10 Microsoft Corporation Access control policy engine controlling access to resource based on any of multiple received types of security tokens
US20060236382A1 (en) * 2005-04-01 2006-10-19 Hinton Heather M Method and system for a runtime user account creation operation within a single-sign-on process in a federated computing environment
US20060248598A1 (en) * 2005-04-29 2006-11-02 Microsoft Corporation Security claim transformation with intermediate claims
US20060259776A1 (en) * 2005-05-13 2006-11-16 Microsoft Corporation Extensible account authentication system
US20070156691A1 (en) * 2006-01-05 2007-07-05 Microsoft Corporation Management of user access to objects
US20090165105A1 (en) * 2007-12-20 2009-06-25 Kapil Chaudhry Method and apparatus for communicating between a user device and a user device locating module to allow a partner service to be provided to a user device
US20090193493A1 (en) * 2008-01-28 2009-07-30 Microsoft Corporation Access policy analysis
US8220035B1 (en) * 2008-02-29 2012-07-10 Adobe Systems Incorporated System and method for trusted embedded user interface for authentication
US20090271856A1 (en) * 2008-04-24 2009-10-29 Novell, Inc. A Delaware Corporation Restricted use information cards
US20120117609A1 (en) * 2010-11-05 2012-05-10 Microsoft Corporation Pluggable Claim Providers

Cited By (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9769137B2 (en) 2008-06-24 2017-09-19 Microsoft Technology Licensing, Llc Extensible mechanism for securing objects using claims
US8990896B2 (en) 2008-06-24 2015-03-24 Microsoft Technology Licensing, Llc Extensible mechanism for securing objects using claims
WO2012047411A2 (en) * 2010-09-28 2012-04-12 Microsoft Corporation Object security over network
WO2012047411A3 (en) * 2010-09-28 2012-05-24 Microsoft Corporation Object security over network
US8776255B2 (en) 2010-09-30 2014-07-08 Microsoft Corporation Claims-aware role-based access control
US8689004B2 (en) 2010-11-05 2014-04-01 Microsoft Corporation Pluggable claim providers
US8973123B2 (en) 2012-04-17 2015-03-03 Microsoft Technology Licensing, Llc Multifactor authentication
US8806652B2 (en) 2012-04-17 2014-08-12 Microsoft Corporation Privacy from cloud operators
US9571491B2 (en) 2012-04-17 2017-02-14 Microsoft Technology Licensing, Llc Discovery of familiar claims providers
US8752158B2 (en) 2012-04-17 2014-06-10 Microsoft Corporation Identity management with high privacy features
US9444817B2 (en) 2012-09-27 2016-09-13 Microsoft Technology Licensing, Llc Facilitating claim use by service providers
US9286465B1 (en) * 2012-12-31 2016-03-15 Emc Corporation Method and apparatus for federated single sign on using authentication broker
US10484357B1 (en) * 2012-12-31 2019-11-19 EMC IP Holding Company LLC Method and apparatus for federated single sign on using authentication broker
US10334040B2 (en) * 2015-05-01 2019-06-25 Vmware, Inc. Sharing information between appliances over a wan via a distributed P2P protocol
US10284642B2 (en) 2015-05-01 2019-05-07 Vmware, Inc. Appliance for sharing information over a WAN via a distributed P2P protocol
US20160323376A1 (en) * 2015-05-01 2016-11-03 Vmware, Inc. Sharing information between appliances over a wan via a distributed p2p protocol
CN107810641A (en) * 2015-06-23 2018-03-16 三星电子株式会社 For providing the method for additional content and the terminal using this method in terminal
US10880610B2 (en) 2015-06-23 2020-12-29 Samsung Electronics Co., Ltd. Method for providing additional contents at terminal, and terminal using same
US11140159B2 (en) * 2016-08-30 2021-10-05 Visa International Service Association Biometric identification and verification among IoT devices and applications
US11870775B2 (en) 2016-08-30 2024-01-09 Visa International Service Association Biometric identification and verification among IoT devices and applications
AU2018287526B2 (en) * 2017-06-19 2022-04-28 Citrix Systems, Inc. Systems and methods for dynamic flexible authentication in a cloud service
US11544356B2 (en) * 2017-06-19 2023-01-03 Citrix Systems, Inc. Systems and methods for dynamic flexible authentication in a cloud service
US20220283959A1 (en) * 2018-05-28 2022-09-08 Intel Corporation Integration of disparate system architectures using configurable isolated memory regions and trust domain conversion bridge
US11627132B2 (en) * 2018-06-13 2023-04-11 International Business Machines Corporation Key-based cross domain registration and authorization
WO2023055505A1 (en) * 2021-09-30 2023-04-06 Microsoft Technology Licensing, Llc. Claim-based authorization across organizations
WO2023230836A1 (en) * 2022-05-31 2023-12-07 Intel Corporation Virtual microcontroller for device authentication in a confidential computing environment

Also Published As

Publication number Publication date
US20150180853A1 (en) 2015-06-25
US8990896B2 (en) 2015-03-24
US9769137B2 (en) 2017-09-19

Similar Documents

Publication Publication Date Title
US9769137B2 (en) Extensible mechanism for securing objects using claims
RU2475840C2 (en) Providing digital credentials
RU2463715C2 (en) Providing digital identification presentations
US7320141B2 (en) Method and system for server support for pluggable authorization systems
US8510818B2 (en) Selective cross-realm authentication
US7827598B2 (en) Grouped access control list actions
US20100299738A1 (en) Claims-based authorization at an identity provider
US20040162786A1 (en) Digital identity management
US20090205018A1 (en) Method and system for the specification and enforcement of arbitrary attribute-based access control policies
US20070271618A1 (en) Securing access to a service data object
US6678682B1 (en) Method, system, and software for enterprise access management control
US20040260946A1 (en) User not present
US11089028B1 (en) Tokenization federation service
CN115176247A (en) Delegation using paired decentralized identifiers
US20240248979A1 (en) Persistent source values for assumed alternative identities
Chai et al. BHE-AC: A blockchain-based high-efficiency access control framework for Internet of Things
Rashid et al. RC-AAM: blockchain-enabled decentralized role-centric authentication and access management for distributed organizations
US20230088787A1 (en) User information management system, user information management method, user agent and program
MXPA04007410A (en) Moving principals across security boundaries without service interruption.
US11954672B1 (en) Systems and methods for cryptocurrency pool management
Almakhour et al. Trustless blockchain-based access control in dynamic collaboration.
Kaffel-Ben Ayed et al. A generic Kerberos-based access control system for the cloud
Raghuwanshi et al. Multi-tier authentication for cloud security
Alagar et al. Uniform service description and contextual access control for trustworthy cloud computing
KR20190058940A (en) Method for Inheriting Digital Information USING WELL DIEING LIFE MANAGEMENT SYSTEM

Legal Events

Date Code Title Description
AS Assignment

Owner name: MICROSOFT CORPORATION, WASHINGTON

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:VEERARAGHAVAN, VENKATESH;DALZELL, JAVIER;SCHMITLIN, BENOIT;AND OTHERS;SIGNING DATES FROM 20080605 TO 20080610;REEL/FRAME:021218/0505

Owner name: MICROSOFT CORPORATION, WASHINGTON

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:VEERARAGHAVAN, VENKATESH;DALZELL, JAVIER;SCHMITLIN, BENOIT;AND OTHERS;REEL/FRAME:021218/0505;SIGNING DATES FROM 20080605 TO 20080610

AS Assignment

Owner name: MICROSOFT TECHNOLOGY LICENSING, LLC, WASHINGTON

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MICROSOFT CORPORATION;REEL/FRAME:034564/0001

Effective date: 20141014

STCF Information on status: patent grant

Free format text: PATENTED CASE

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551)

Year of fee payment: 4

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 8